Analysis
-
max time kernel
1352701s -
max time network
29s -
platform
android_x64 -
resource
android-x64 -
submitted
05-10-2021 13:24
Static task
static1
Behavioral task
behavioral1
Sample
commerzbank.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
commerzbank.apk
-
Size
8.8MB
-
MD5
4bab607247feb6002ac4e3d31ac0bef7
-
SHA1
e1f7d9b622b7e46706287ac540e92d0bb6eea422
-
SHA256
da61bb04b91120fab02e374d6f4001728dc5736c4e3ac011841fb1523d3ed3be
-
SHA512
77f612a1f6a3d32d5c7d732dc3b6509852c766192f8f2c2d8d259fec87860caeb9712e4bfd9114b82f515915c7f55f17664bc3bd513cfc1942ee1a7d90a146f5
Score
10/10
Malware Config
Signatures
-
Hydra
Android banker and info stealer.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ixpwrffz.cvbpkal/kbshzsuxvI/nnngJbcvzijskcb/base.apk.kgjtjhj1.gUj 3674 com.ixpwrffz.cvbpkal [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.ixpwrffz.cvbpkal/kbshzsuxvI/nnngJbcvzijskcb/base.apk.kgjtjhj1.gUj] 3674 com.ixpwrffz.cvbpkal